






Do you have a question about the Xerox WorkCentre 5855 and is the answer not in the manual?
| Print Resolution | Up to 1200 x 1200 dpi |
|---|---|
| Standard Paper Capacity | 1, 100 sheets |
| Duplex Printing | Yes |
| Connectivity | 10/100/1000Base-T Ethernet, USB 2.0 |
| Functions | Print, Copy, Scan, Fax |
| Processor | 1.2 GHz |
| Memory | 2 GB |
| Hard Drive | 160 GB |
| Scan Resolution | Up to 600 x 600 dpi |
| Type | Laser |
| Print Speed (Color) | Up to 55 ppm |
| Copy Resolution | Up to 600 x 600 dpi |
| Print Speed | Up to 55 ppm |
| Copy Speed (Black) | Up to 55 ppm |
| Dimensions | 640 x 670 x 1118 mm |
| Scan Speed | Up to 70 ipm (black and white / color) |
Details for the Security Target (ST) and Target of Evaluation (TOE).
General overview of the Xerox WorkCentre multi-function device.
Specifies the type of Target of Evaluation (TOE).
Details on hardware, software, and firmware not part of the TOE.
Detailed description of the Target of Evaluation (TOE).
Defines the physical components included in the TOE.
Defines the software and firmware scope of the TOE.
Features enabled and not included in the evaluated configuration.
Claims conformance to Common Criteria (CC) standards.
Claims conformance to IEEE Standard Protection Profile.
Claims conformance to EAL2 package and additional packages.
Rationale for conformance claims and requirements.
Defines key terms used in the security problem definition.
Identifies user roles interacting with the TOE.
Defines passive entities (assets) within the TOE.
Describes data created by and for users.
Describes data created by and for the TOE.
Identifies processing, storage, and transmission functions.
Defines types of actions performed by subjects on objects.
Mechanisms for data transfer into and out of the TOE.
Conditions assumed to be true for security objectives.
Potential security threats to the TOE.
Identifies threats the TOE is designed to counter.
Identifies threats addressed by the IT environment.
Describes organizational security policies applicable to the TOE.
Objectives the TOE must fulfill.
Objectives for the IT environment supporting the TOE.
Objectives for non-IT methods in the TOE environment.
Justification for how objectives mitigate threats and policies.
Defines requirements to restrict data forwarding between external interfaces.
Explains conventions used for identifying SFRs and SARs.
Defines security policies enforced by the TSF.
Policy for filtering network traffic based on IP rules.
Policy for controlling user access to objects and operations.
Policy for controlling user access to TOE functions.
Lists and describes the TOE's functional security requirements.
Lists requirements explicitly stated for the TOE.
Lists security assurance requirements for the TOE.
Explains how SFRs fulfill security objectives.
Justification for the selected assurance level and components.
Explains how security functional requirement dependencies are met.
Overview of security functions performed by the TOE.
Functionality for overwriting temporary files on the HDD.
Controls data flow between interfaces and prevents unauthorized transmission.
Manages user identification and authentication.
Manages identification via external servers.
Generates and manages audit logs for events.
Details cryptographic operations like encryption and signature.
Supports encryption of designated portions of the hard disk.
Enforces administrator-defined IPv4 filtering rules.
Supports secure communication protocols like TLS, SFTP, IPsec.
Manages security functions and attributes.












Loading...